Home | Amazing | Today | Tags | Publishers | Years | Search 
Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

An Implementation Guide to Compiler Writing
An Implementation Guide to Compiler Writing

An important aspect of teaching a course in compiler writing is to illustrate the key theoretical concepts normally taught in such a course. A frequently used strategy for achieving this goal is to have a student design a simple programming language and implement a compiler for this language. Many texts in compiler writing do not,...

Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing
Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing

Wiley-Interscience Series in Discrete Mathematics and Optimization Advisory Editors Ronald L. Graham Jan Karel Lenstra Robert E. Tarjan Discrete Mathematics and Optimization involves the study of finite structures. It is one of the fastest growing areas in mathematics today. The level and depth of recent advances in the area and the wide...

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

Computer Organization, Design, and Architecture, Fourth Edition
Computer Organization, Design, and Architecture, Fourth Edition

This book covers the organization, design, and architecture of computers. Architecture is the ‘‘art or science of building; a method or style of building,’’ according to Webster’s. A computer architect develops the functional and performance specifications for the various blocks of a computer system and...

Developer's Guide to Microsoft Prism 4
Developer's Guide to Microsoft Prism 4

Building WPF and Silverlight applications can be challenging, especially for those new to the technology. Building clean, maintainable, extensible, testable, loosely coupled ones— with no idea where to start—is close to impossible. In late 2007, I was privileged to get a call from Glenn Block at Microsoft asking if I was...

Image and Video Processing in the Compressed Domain
Image and Video Processing in the Compressed Domain

With more and more images and videos being available in the compressed format, researchers have started taking interest in the aspect of designing algorithms for different image operations directly in their domains of representation. This would not only avoid the inverse and forward transformation steps and potentially make the...

Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002

SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a...

RHCE Red Hat Certified Engineer Linux: 100 Success Secrets on RHCE Linux Test Preparation, Study Guides, Practice Exams, Braindumps, Certification Exam
RHCE Red Hat Certified Engineer Linux: 100 Success Secrets on RHCE Linux Test Preparation, Study Guides, Practice Exams, Braindumps, Certification Exam
Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an individual's ability to configure networking services and security on servers running a Red Hat OS.

The rise of Red Hat has been marvelous to watch. Starting...

How to Write Fast Under Pressure
How to Write Fast Under Pressure
Anyone who regularly deals with work-related writing deadlines knows the kind of paralysis that can take over when there's too much to accomplish and not enough time to compose a clear sentence. This book contains an easy, efficient, and confidence-building process for keeping up and being productive, even under tight time constraints and...
Linux iptables Pocket Reference
Linux iptables Pocket Reference
Firewalls, Network Address Translation (NAT), and network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on Linux and makes Linux an extremely flexible system for any kind of network filtering...
Practical Palm Pre WebOS Projects (Beginning)
Practical Palm Pre WebOS Projects (Beginning)

The Palm Pre is the hottest new device on the block. It’s the cell phone—nay, personal digital everything—that all the cool kids want to get their hands on . . . but no one wants to use it more than developers!

The Palm Pre is more than just a way-cool device, though: it is built on Palm’s brand-spanking-new...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy